Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 210 for clusterRoles (0.24 sec)

  1. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.ClusterRole.yaml

      - matchExpressions:
        - key: keyValue
          operator: operatorValue
          values:
          - valuesValue
        matchLabels:
          matchLabelsKey: matchLabelsValue
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      annotations:
        annotationsKey: annotationsValue
      creationTimestamp: "2008-01-01T01:01:01Z"
      deletionGracePeriodSeconds: 10
      deletionTimestamp: "2009-01-01T01:01:01Z"
      finalizers:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1.ClusterRole.json

    {
      "kind": "ClusterRole",
      "apiVersion": "rbac.authorization.k8s.io/v1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
        "deletionGracePeriodSeconds": 10,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 06 21:25:20 UTC 2022
    - 1.8K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.8.md

    * The API Server now automatically creates RBAC ClusterRoles for CSR approving.  ([#49284](https://github.com/kubernetes/kubernetes/pull/49284), [@luxas](https://github.com/luxas))
        * Each deployment method should bind users/groups to the ClusterRoles if they are using this feature.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml

        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: cluster-admin
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: cluster-admin
      subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: Group
        name: system:masters
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 11 19:01:47 UTC 2020
    - 5.7K bytes
    - Viewed (0)
  5. releasenotes/notes/manifest-base-cleanup.yaml

          | --------------------------------------- | --------------------------------------- |
          | `ClusterRole istiod`                    | `ClusterRole istiod-clusterrole`        |
          | `ClusterRole istiod-reader`             | `ClusterRole istio-reader-clusterrole`  |
          | `ClusterRoleBinding istiod`             | `ClusterRoleBinding istiod-clusterrole` |
          | `Role istiod`                           | `Role istiod`                           |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jul 27 04:26:43 UTC 2023
    - 1.7K bytes
    - Viewed (0)
  6. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

        name: system:controller:clusterrole-aggregation-controller
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:clusterrole-aggregation-controller
      subjects:
      - kind: ServiceAccount
        name: clusterrole-aggregation-controller
        namespace: kube-system
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  7. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml

      apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRole
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: admin
      rules: null
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRole
      metadata:
        annotations:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jul 18 08:11:08 UTC 2023
    - 24.1K bytes
    - Viewed (0)
  8. manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istiod
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Oct 10 17:32:44 UTC 2021
    - 1.3K bytes
    - Viewed (0)
  9. manifests/charts/istiod-remote/templates/clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istiod
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Oct 10 17:32:44 UTC 2021
    - 1.4K bytes
    - Viewed (0)
  10. manifests/charts/istiod-remote/templates/reader-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istio-reader
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 12 16:44:21 UTC 2021
    - 589 bytes
    - Viewed (0)
Back to top